计算机科学 ›› 2023, Vol. 50 ›› Issue (5): 348-354.doi: 10.11896/jsjkx.220300207
涂思盼, 张琳, 刘茜萍
TU Sipan, ZHANG Lin, LIU Xiping
摘要: 目前大多假位置隐私保护方法没有充分考虑到攻击者可能掌握用户上次请求服务时所提交的信息等背景知识,因此不能有效抵御背景知识攻击。基于此,提出了基于行为关联的双重假位置生成算法,该算法包含两个部分,首先在充分考虑访问概率、位置语义等地理信息的基础上提出了初次假位置生成算法,然后根据时间可达性、方向相似性等用户行为信息提出了再次假位置生成算法,最后通过大量的仿真实验,验证了此算法能够抵御攻击者的推理攻击和相似性攻击。
中图分类号:
[1]WAN S,LI F H,NIU B,et al.Research progress on locationprivacy-preserving techniques[J].Journal on Communications,2016,37(12):124-141. [2]XU J,TANG X,HU H,et al.Privacy-conscious location-based queries in mobile environments[J].IEEE Transactions on Parallel and Distributed Systems,2009,21(3):313-326. [3]LI X,MIAO M,LIU H,et al.An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism[J].Soft Computing,2017,21(14):3907-3917. [4]YING B,MAKRAKIS D.Protecting location privacy with clustering anonymization in vehicular networks[C]//2014 IEEE Conference on Computer Communications Workshops(INFOCOM WKSHPS).IEEE,2014:305-310. [5]HARA T,SUZUKI A,IWATA M,et al.Dummy-based user lo-cation anonymization under real-world constraints[J].IEEE Access,2016,4:673-687. [6]LU H,JENSEN C S,YIU M L.Pad:privacy-area aware,dummy-based location privacy in mobile services[C]//Proceedings of the Seventh ACM International Workshop on Data Enginee-ring for Wireless and Mobile Access.2008:16-23. [7]NIU B,LI Q,ZHU X,et al.Achieving k-anonymity in privacy-aware location-based services[C]//IEEE INFOCOM 2014-IEEE Conference on Computer Communications.IEEE,2014:754-762. [8]GRUTESER M,GRUNWALD D.Anonymous usage of loca-tion-based services through spatial and temporal cloaking[C]//Proceedings of the 1st International Conference on Mobile Systems,Applications and Services.2003:31-42. [9]CHOW C Y,MOKBEL M F,AREF W G.Casper* Query processing for location services without compromising privacy[J].ACM Transactions on Database Systems(TODS),2009,34(4):1-48. [10]KALNIS P,GHINITA G,MOURATIDIS K,et al.Preventinglocation-based identity inference in anonymous spatial queries[J].IEEE Transactions on Knowledge and Data Engineering,2007,19(12):1719-1733. [11]KIDO H,YANAGISAWA Y,SATOH T.An anonymous communication technique using dummies for location-based services[C]//Proceedings of the International Conference on Pervasive Services(ICPS'05).IEEE,2005:88-97. [12]WU Z,LI G,SHEN S,et al.Constructing dummy query se-quences to protect location privacy and query privacy in location-based services[J].World Wide Web,2021,24(1):25-49. [13]CHEN S,SHEN H.Semantic-aware dummy selection for location privacy preservation[C]//2016 IEEE Trustcom/BigDataSE/ISPA.IEEE,2016:752-759. [14]WANG J,WANG C R,MA J F,et al.Dummy location selectionalgorithm based on location semantics and query probability[J].Journal on Communications,2020,41(3):53-61. [15]LI B,ZHU H,XIE M.Quantifying location privacy risks underheterogeneous correlations[J].IEEE Access,2021,9:23876-23893. [16]ZHANG A,LI X H,LI B,et al.Location Privacy DesensitizationAlgorithm Based On Dummy Location Selection[J].Application Research of Computers,2022,39(5):1551-1556. [17]ZHANG L,ZHANG H G,LIU Q P,et al.A dummy locationscreening algorithm based on multivariate data[J].Journal of Nanjing University of Posts and Telecommunications(Natural Science),2021,41(6):47-56. [18]ZHOU J Q,LI Y J.Personalized Dummy Generation MethodBased on Spatiotemporal Correlations and Location Semantics[J].Journal of Software,2019,30(S1):18-26. [19]LIU H,LI X,LI H,et al.Spatiotemporal correlation-awaredummy-based privacy protection scheme for location-based ser-vices[C]//IEEE INFOCOM 2017-IEEE Conference on Computer Communications.IEEE,2017:1-9. [20]SINWAR D,KAUSHIK R.Study of Euclidean and Manhattandistance metrics using simple k-means clustering[J].International Journal for Research in Applied Science and Engineering Technology,2014,2(5):270-274. [21]ZHENG Y,ZHANG L,XIE X,et al.Mining interesting loca-tions and travel sequences from GPS trajectories[C]//Procee-dings of the 18th International Conference on World Wide Web.2009:791-800. [22]ZHENG Y,LI Q,CHEN Y,et al.Understanding mobility based on GPS data[C]//Proceedings of the 10th International Confe-rence on Ubiquitous Computing.2008:312-321. |
[1] | 王磊, 李晓宇. 基于随机洋葱路由的LBS移动隐私保护方案 LBS Mobile Privacy Protection Scheme Based on Random Onion Routing 计算机科学, 2022, 49(9): 347-354. https://doi.org/10.11896/jsjkx.210800077 |
[2] | 张学军, 杨昊英, 李桢, 何福存, 盖继扬, 鲍俊达. 融合语义位置的差分私有位置隐私保护方法 Differentially Private Location Privacy-preserving Scheme withSemantic Location 计算机科学, 2021, 48(8): 300-308. https://doi.org/10.11896/jsjkx.200900198 |
[3] | 王辉, 朱国宇, 申自浩, 刘琨, 刘沛骞. 基于用户偏好和位置分布的假位置生成方法 Dummy Location Generation Method Based on User Preference and Location Distribution 计算机科学, 2021, 48(7): 164-171. https://doi.org/10.11896/jsjkx.200800069 |
[4] | 王乐业. 群智感知中的地理位置本地化差分隐私机制:现状与机遇 Geographic Local Differential Privacy in Crowdsensing:Current States and Future Opportunities 计算机科学, 2021, 48(6): 301-305. https://doi.org/10.11896/jsjkx.201200223 |
[5] | 周艺华, 李广辉, 杨宇光, 侍伟敏. 基于GeoHash的近邻查询位置隐私保护方法 Location Privacy Preserving Nearest Neighbor Querying Based on GeoHash 计算机科学, 2019, 46(8): 212-216. https://doi.org/10.11896/j.issn.1002-137X.2019.08.035 |
[6] | 吴丹丹, 吕鑫. 分布式结构下基于用户协作的匿名区域构建算法 Location Anonymous Algorithm Based on User Collaboration under Distributed Structure 计算机科学, 2019, 46(4): 158-163. https://doi.org/10.11896/j.issn.1002-137X.2019.04.025 |
[7] | 童海,白光伟,沈航. 基于双向拍卖的k-匿名激励机制 Double-auction-based Incentive Mechanism for k-anonymity 计算机科学, 2019, 46(3): 202-208. https://doi.org/10.11896/j.issn.1002-137X.2019.03.030 |
[8] | 吴忠忠,吕鑫,李鑫. 基于查询概率的假位置选择算法 Query Probability Based Dummy Location Selection Algorithm 计算机科学, 2018, 45(5): 143-146. https://doi.org/10.11896/j.issn.1002-137X.2018.05.024 |
[9] | 熊婉竹, 李晓宇. 基于匿名路由的移动位置隐私保护 Mobile Location Privacy Protection Based on Anonymous Routing 计算机科学, 2018, 45(10): 142-149. https://doi.org/10.11896/j.issn.1002-137X.2018.10.027 |
[10] | 董玉兰,皮德常. 一种基于假数据的新型轨迹隐私保护模型 Novel Trajectory Privacy Preserving Mechanism Based on Dummies 计算机科学, 2017, 44(8): 124-128. https://doi.org/10.11896/j.issn.1002-137X.2017.08.022 |
[11] | 戴佳筑,华亮. 路网环境下敏感位置匿名区域的生成方法 Method of Anonymous Area Generation for Sensitive Location Protection under Road Networks 计算机科学, 2016, 43(3): 137-144. https://doi.org/10.11896/j.issn.1002-137X.2016.03.027 |
[12] | 马春来,单洪,马涛,顾正海. 一种基于随机森林的LBS用户社会关系判断方法 Random Forests Based Method for Inferring Social Ties of LBS Users 计算机科学, 2016, 43(12): 218-222. https://doi.org/10.11896/j.issn.1002-137X.2016.12.040 |
[13] | 陈业纲,徐则同. 基于聚类、空间分集和轨迹连续的实时定位算法 Real-time Positioning Algorithm Based on Clustering,Spatial Diversity and Continuous Trajectory 计算机科学, 2015, 42(8): 283-287. |
[14] | 王鹏飞,李千目,朱保平. 基于增量近邻查询的位置隐私保护方法 Location Privacy Protection Method Based on Incremental Nearest Neighbor Query 计算机科学, 2015, 42(3): 158-161. https://doi.org/10.11896/j.issn.1002-137X.2015.03.033 |
[15] | 王嘉慧,程久军. P2P模式下基于网格扩增的位置匿名算法 Spatial Cloaking Algorithm Based on Grid Expansion in P2P Mode 计算机科学, 2014, 41(4): 90-94. |
|